Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-15780

Опубликовано: 15 июн. 2020
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

A flaw was found in how the ACPI table loading through acpi_configfs was handled when the kernel was locked down. This flaw allows a (root) privileged local user to circumvent the kernel lockdown restrictions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

This issue is rated as having Moderate impact because of the privileges required for exploitation.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-altNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise MRG 2kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2020:321929.07.2020
Red Hat Enterprise Linux 8kernelFixedRHSA-2020:321829.07.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionskernelFixedRHSA-2020:322829.07.2020
Red Hat Enterprise Linux 8.1 Extended Update SupportkernelFixedRHSA-2020:322229.07.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1852962kernel: lockdown: bypass through ACPI write via acpi_configfs

EPSS

Процентиль: 73%
0.00776
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
ubuntu
около 5 лет назад

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

CVSS3: 6.7
nvd
около 5 лет назад

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

CVSS3: 6.7
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 6.7
debian
около 5 лет назад

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux k ...

CVSS3: 6.7
github
больше 3 лет назад

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

EPSS

Процентиль: 73%
0.00776
Низкий

6.4 Medium

CVSS3